explaingit

rad-security/goal-blueprints

12Audience · developerComplexity · 2/5ActiveSetup · easy

TLDR

Library of reusable prompt templates for the /goal feature in Claude Code and Codex CLI, aimed at security engineers running multi-turn audits.

Mindmap

mindmap
  root((goal-blueprints))
    Inputs
      Repo source code
      Threat model context
      Synthetic test data
    Outputs
      Audit findings
      Remediation memos
      Verified evidence
    Use Cases
      Product security audit
      Launch readiness review
      AI feature pentest
      Supply chain review
    Tech Stack
      Markdown
      Claude Code
      Codex CLI

Things people build with this

USE CASE 1

Run a multi-turn product-wide security audit with an AI agent and a fixed stop condition

USE CASE 2

Audit auth, sessions, MFA, OAuth, OIDC, and CSRF using the Access Boundaries blueprint

USE CASE 3

Evaluate an AI feature for prompt injection, tool abuse, and retrieval leakage

USE CASE 4

Replay an incident or validate detection coverage in CI

Tech stack

MarkdownClaude CodeCodex CLI

Getting it running

Difficulty · easy Time to first run · 30min

No install step but the /goal feature is experimental in Codex CLI and requires Claude Code or a compatible host, and the operator must still control sandboxing and credentials.

In plain English

This repo is a library of reusable prompt templates for security engineers who are working with AI coding assistants. The templates are written for the /goal feature in tools like Claude Code and the experimental /goal in Codex CLI. The /goal feature lets you set a longer-lived objective with a built-in checking loop, so the agent keeps working across many turns until a stated condition is met instead of treating each prompt as a one-off. The argument behind the project is that security work is rarely one action. It is a loop of mapping the attack surface, testing assumptions, looking at code, APIs, data, logs, and product behavior, verifying the evidence, writing up the risk and remediation, and repeating until the original question is actually answered. A blueprint here turns that loop into a written contract so the same template can be reused across projects. The catalog is organized by category. Product Trust includes a product-wide security audit and a launch-readiness review. Access Boundaries covers authorization plus tenant isolation, and a hardening review of login, sessions, cookies, MFA, OAuth, OIDC, and CSRF. AI Security has an evaluation template for prompt injection, tool abuse, and retrieval leakage in AI features. Software Supply Chain covers secrets and dependency risk plus repository and CI integrity. There are also blueprints for cloud and IaC exposure, incident replay and detection validation, and privacy, logging, and telemetry tracing. Each blueprint follows the same structure: GOAL with a verifiable end state, CONTEXT for the repo and threat model, CONSTRAINTS such as sandbox-only and no production data, PRIORITY trade-offs, an expected PLAN, DONE WHEN criteria, a VERIFY section listing the proof commands or artifacts, an OUTPUT description, and STOP RULES that tell the agent to halt rather than improvise. A template file and a docs page on writing goals are included. The README is clear about limits and safety. /goal is not a sandbox, so permissions, credentials, network access, and isolation are still the operator's responsibility. The goal needs an observable stop condition, evidence must be visible inside the session for the agent to judge it, and synthetic data and isolated accounts are the default. Stop rules should fire if production risk, credential ambiguity, or any destructive action appears. The repo notes that no license has been picked yet, and that the prompts are intended for authorized work on systems you own or have permission to test.

Copy-paste prompts

Prompt 1
Adapt the product-wide security audit blueprint from goal-blueprints to my Next.js + Supabase app and fill in the CONTEXT section
Prompt 2
Use the AI Security blueprint from goal-blueprints to test my LangChain RAG endpoint for prompt injection and retrieval leakage
Prompt 3
Write a new blueprint following the goal-blueprints structure for reviewing OAuth scopes in a multi-tenant SaaS
Prompt 4
Apply the supply chain blueprint from goal-blueprints to my repo and produce a DONE WHEN checklist for secrets and dependency risk
Open on GitHub → Explain another repo

Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.